Some visitors are unable to access the wireless network. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors?
Building ABuilding BBuilding C
Channel: 2Channel: 6Channel: 11
Encryption: WPA2Encryption: WPA2Encryption: WPA2
A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the following would be the MOST appropriate solution? (Select TWO).
A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?
A technician is troubleshooting Internet connectivity for a PC. Which of the following is MOST likely the reason for Internet connectivity issues upon inspecting the routing table?
A network technician is assigned to view websites that a user has visited. Which of the following should the technician review to find this information?
A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?
A client’s computer is unable to access any network resources. Which of the following utilities can a technician use to determine the IP address of the client’s machine?
Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification?
The network technician is working in an office that has both VoIP telephone lines and analog lines. A user states that the fax machine is not sending or receiving faxes. The network technician determines that the fax machine uses an analog phone line. Which of the following tools would the technician use to troubleshoot the issue?
A company would like their technicians to be able to connect to employee desktops remotely via RDP. Which of the following default port numbers need to be opened on the firewall to support this?
A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method?
Ann, a user, connects to her company’s secured wireless network in the conference room when attending meetings. While using the conference room this morning, Ann notices an unsecured wireless network with the same name is available. Ann connects her laptop to this network instead of to the secured one. Ann has fallen victim to which of the following threats?
If a wireless key gets compromised, which of the following would MOST likely prevent an unauthorized device from getting onto the network?
A small company is looking to install a wireless network to enable its relatively old fleet of laptops to have limited internet access internally. The technician on the project knows that the units do not support modern encryption standards. If backwards compatibility is the greatest concern, which of the following is the MOST appropriate wireless security type to choose?
An administrator needs to open ports in the firewall for both DNS and eDNS. Which of the following default ports would need to be opened on the firewall? (Select TWO).
A customer wants to keep cost to a minimum and has only ordered a single static IP address from the ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address?
A SOHO client has tasked Joe, a technician, with setting up a basic SOHO network to support four laptops and one desktop PC. The client would also like to have a basic wireless network to use for internal devices only that is secure. Given the list of requirements, which of the following devices would Joe need to purchase for his client? (Select TWO).
A technician finds that the network card is no longer functioning. At which of the following OSI layers is the problem occurring?
Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances?
A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO).
Which of the following ports would have to be allowed through a firewall for NTP to pass on its default port?
Which of the following port numbers needs to be open on a firewall to allow FTP traffic?
Joe, a user, has a computer that has a link light on his network interface card (NIC); however, Joe is unable to access the Internet. Which of the following is the cause of this issue?
A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use?
A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this?
A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration?
Which of the following wireless parameters may need to be modified when a new cordless telephone is installed?
After a network technician has added a new workstation and cabling to the network, users report the network is very slow. The activity lights on all switches are blinking rapidly, showing large amounts of traffic. Which of the following is the BEST explanation for the traffic?
A user is unable to communicate with any local network resources, but is connected to the wireless network and can access the Internet. The network technician notices that the laptop has an incorrect IP address, even though it shows it is connected. Which of the following is the MOST likely cause?
Which of the following commands will provide an administrator with the number of hops a packet takes from host to host?
The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem?
Joe, a network technician, is asked to install a couple new WAP’s inside a back warehouse that was added to a main warehouse facility that already has complete wireless coverage on both the 2.4GHz and 5GHz frequencies. Joe already has a complete wireless heat map of the main warehouse. Which of the following is the first step that Joe should do before choosing which WAP’s to use?
All users on a specific network segment report losing access to the wired network. During troubleshooting, the network administrator observes link lights on the workstations. When physically reviewing each switch, the network administrator changes the switch view settings to Activity and sees that all port lights remain solid green. Which of the following is MOST likely causing this issue?
A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST?
Which of the following is needed when using WPA2-Enterprise wireless encryption?
A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review?
Users have been stating that they need to logon to too many applications and web apps with different credentials that use different rule sets. Which of the following would BEST address these concerns?
A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated wattage the switch supports to power all of the phones at full power?
GigSwitch1 is currently configured with a speed of 100 and Duplex is set to Auto on all interfaces. Interface 2 will be connected to GigSwitch2 which is used for all departments. Interface 1 will be used for HR traffic only.
GigSwitch1 needs to be configured with the following parameters:
Configure the necessary protocol to prevent switching loops
Configure GigSwitch1 with a /24 IP address for management
Traffic across Interface 1 needs to be forced to accept and receive up to 100Mbps data at the same time
Traffic across Interface 2 needs to be forced to use Gigabit speeds and maximum performance
Drag and drop the appropriate configurations to their corresponding requirements. All placeholders must be filled. Not all configurations will be used.
Which of the following WAN technology types are mainly used over POTS lines to provide Internet connectivity? (Select TWO).
Which of the following 802.11 standards transmits the signals the GREATEST distance?
Which of the following wireless standards can operate on the same frequency but are not compatible?
A small business owner is in the process of setting up a SOHO office. The office has only one connection to the Internet via a broadband cable connection. The office has four subnets that must be able to connect to the Internet. Which of the following devices would enable the owner to meet these requirements?
Several users from the finance department report that they are able to access the Internet, but unable to connect to their financial applications. The network technician is unable to ping the finance server. The technician decides to check the switch and determines that Internet access is working. Which of the following is a possible cause of the access issues?
A network technician visits a site that needs voice connectivity to the corporate office and installs four IP phones. The phone exchange resides at the telephone company. Which of the following technologies is being used?
Which of the following DNS records must be queried to resolve the IPv6 address of a website?
Which of the following DNS records is used in conjunction with 192:168::1:10?
Companies trying to cut down on constant documentation of IP addresses could use which of the following?
Which of the following devices acts as a gateway between clients and servers?
A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working?
A company needs to find a way to best route latency-sensitive traffic appropriately on an already congested network. Which of the following would be BEST suited for this purpose?
Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions?
A user is having trouble with their fax machine disconnecting during transmissions. The technician believes that a DSL signal may be on the same line as the fax. Which of the following tools would MOST likely help prove this hypothesis?
The components of a NIC function at which of the following layers of the OSI model? (Select TWO).
Which of the following OSI model layers is used to frame packets that are sent over a medium?
At which of the following layers of the OSI model is the Logical Link Control found?
The address 6FFE:FFFF:0000:2F3B:04AC:00FF:FEBE:5C4A is an example of which of the following?
A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?
Which of the following tools will scan a network for hosts and provide information on the installed operating system?
Which of the following would a network administrator use to scan a network for vulnerabilities?
Which of the following are authentication methods that can use AAA authentication? (Select TWO).
An administrator would like to scan for open ports on the subnet and determine if any vulnerable applications are listening. Which of the following tools would the administrator MOST likely use?
The company requires all users to authenticate to the network with a smart card, a pin number, and a fingerprint scan. Which of the following BEST describes the user authentication being used?
An administrator needs to provide remote connectivity to server1, web traffic to server2, and FTP access to server3 using a single outside IP address. Which of the following would the administrator implement on the firewall to accomplish this?
Users trying to access a website using HTTPS are being blocked by the firewall. Which of the following ports needs to be allowed?
The network administrator has been tasked to create a network segment where resources can be placed for public web access.
Which of the following should be implemented?
Which of the following security protocols would BEST protect a connection to a remote email server and ensure full integrity of all transmitted email communication?
A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?
A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero day exploits. Which of the following should be deployed?
A user authenticated to more than one website using their same credentials is an example of:
Which of the following configurations of a wireless network would be considered MOST secure?
A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example?
Which of the following authentication solutions use tickets that include valid credentials to access additional network resources?
Which of the following would a network administrator MOST likely use to actively discover unsecure services running on a company’s network?
Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).
An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?
A network technician is troubleshooting signal problems with certain WAPs in an office and finds consistently high ping times across the units. Such an issue is called which of the following?
A technician is not getting a link light on two switches connected by a fiber cable. After the cable tests good, which of the following should the technician check NEXT?
A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST?
While preparing to replace an old CAT3 cable with a CAT6 cable to implement VoIP, a facilities employee mistakenly disconnects the entire patch panel, including valid wiring to live workstations. Which of the following should an administrator use in order to connect those ports FIRST?
Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector?
A technician has two wireless 802.11g APs. One is set to channel 1 and the other channel 6. The APs appear to interfere with each other. Which of the following is MOST likely the reason?
Which of the following cable types supports the FURTHEST distance when connecting various MDFs?
Which of the following cables has a hard plastic cross inside the cable to separate each pair of wires?
A consultant has been hired to wire a simple small office of ten computers to a layer 2 Ethernet 100BaseT switch. Which of the following cabling will be needed for the installation?
A technician is installing an 802.11n network. The technician is using a laptop that can connect at a maximum speed of 11 Mbps. The technician has configured the 802.11n network correctly but thinks it could be the type of WLAN card used on the laptop. Which of the following wireless standards is the WLAN card MOST likely using?
A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which of the following is considered the demarc?
A VoIP system running over a wireless network link is continually being reported as choppy. Which of the following is the cause of this issue?
Which of the following can operate on BOTH the 2.4GHz and 5.8GHz frequencies?
Which of the following copper cable types should be chosen to run gigabit speeds through a dropped ceiling that returns airflow?
Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?
The cost of installing fiber cable in a factory environment is too high. Which of the following cables should be used to minimize the effect of EMI?
In the event of a fire in an office building, which of the following cable types should be installed to prevent toxic gas from burning PVC cable coatings?
The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue?
A technician is troubleshooting a problem where data packets are being corrupted. Which of the following connectivity problems should the technician check?
A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:
A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).
A network technician has just upgraded a switch. The new switch’s IP range and subnet mask correctly match other network devices. The technician cannot ping any device outside of the switch’s own IP subnet. The previous switch worked correctly with the same settings. Which of the following is MOST likely the problem?
Which of the following would a technician do to monitor remote traffic through an access point?
Which of the following can be used to decrypt SSL packets which encapsulate internal network addresses in the payload?
Which of the following can determine the last time an address lease was renewed on a network device?
A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration?
A technician has been tasked with planning and implementing a new wired-only network for a small office. A hardware list has been compiled, but the technician is unsure about the final necessary item. Which of the following will BEST complete the small wired network setup?
(1) 1000 foot CAT6 spool
(1) crimper
(1) 16 port gigabit switch
(20) RJ-45 connectors
(12) RJ-45 wall jacks
(1) ____________
A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below?
Querying active state...
TCP Global Parameters
----------------------------------------------
Receive-Side Scaling State : enabled
Chimney Offload State : disabled
Receive Window Auto-Tuning Level : normal
Add-On Congestion Control Provider : ctcp
ECN Capability : disabled
RFC 1323 Timestamps : disabled
A technician needs to verify the time of a power outage. Which of the following may be used to determine this information?
Joe, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?
A technician has to terminate a CAT3 cable to a 110 block. Which of the following tools should the technician use?
The technician is working on a DNS problem. Which of the following software tool is the technician MOST likely to use to troubleshoot this issue?
Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO).